Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing avatar environmental update in shared virtual reality environments., , and . IMMERSCOM, page 1. ICST/ACM, (2007)Special Section on Multi-dimensional Mobile Information Networks., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1549-1550 (2008)Securing IPv6 neighbor and router discovery., , , , , and . Workshop on Wireless Security, page 77-86. ACM, (2002)Mobility Header Home Agent Switch Message., , , and . RFC, (January 2008)Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)., and . RFC, (June 2008)The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture., , and . RFC, (March 2004)Conversion of LDAP Schemas to and from SLP Templates., , and . RFC, (September 2000)OpenRAN: a new architecture for mobile wireless Internet radio access networks., and . IEEE Commun. Mag., 40 (5): 118-123 (2002)Realizing packet-optical integration with SDN and OpenFlow 1.1 extensions., , , , and . ICC, page 6633-6637. IEEE, (2012)10372 Abstracts Collection and Report - User-Centric Networking., , , and . User-Centric Networking, volume 10372 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)